Scheme for device and user authentication with key...
Scheme for sub-realms within an authentication protocol
Scheme, system and equipment for inter-equipment...
Scoped federations
Scrambled information transmitting and receiving method
Scrambling of image by randomizing pixel values
Screen saver displaying identity content
Seamless integration of application programs with security...
Secrecy communication system
Secret data storage device, secret data reading method, and cont
Secret information protection system
Secret key generating method, encryption method,...
Secret sharing device, method, and program
Secret-key-controlled reversible circuit and corresponding...
Secure access to software modules
Secure ADS-B authentication system and method
Secure and controlled electronic document distribution...
Secure and differentiated delivery of network security...
Secure and dynamic biometrics-based token generation for...
Secure and modifiable configuration files used for remote...